Difference between revisions of "Research Topics"

m(New page: Interested in doing research in computer forensics? Looking for a master's topic, or just some ideas for a research paper? Here is our list. Please feel free to add your own ideas. ''Poten...)

* Encryption of data segments with an AES-256 key specified by a password

* Encryption of data segments with an AES-256 key specified by a password

* Encryption of the AES-256 key with a public key (and decryption with a corresponding private key)

* Encryption of the AES-256 key with a public key (and decryption with a corresponding private key)

+

* Evaluation of the AFF data page size. What is the optimal page size for compressed forensic work?

+

* Replacement of the AFF "BADFLAG" approach for indicating bad data with a bitmap.

''Sponsor for these projects: [[User:Simsong Simson Garfinkel]]''

''Sponsor for these projects: [[User:Simsong Simson Garfinkel]]''

+

+

==Flash Memory==

+

Flash memory devices such as USB keys implement a wear leveling algorithm in hardware so that frequently rewritten blocks are actually written to many different physical blocks. Are there any devices that let you access the raw flash cells underneath the wear leveling chip? Can you get statistics out of the device? Can you access pages that have been mapped out (and still have valid data) but haven't been mapped back yet? Can you use this as a technique for accessing deleted information?

+

+

''Sponsor: [[User:Simsong Simson Garfinkel]]''

Revision as of 11:09, 22 April 2007

Interested in doing research in computer forensics? Looking for a master's topic, or just some ideas for a research paper? Here is our list. Please feel free to add your own ideas. Potential Sponsor, when present, indicates the name of a researcher who would be interested in lending support in the form of supervision or other resources to a project.

Tool Development

AFF Enhancement

AFF is the Advanced Forensics Format, developed by Simson Garfinkel and Basis Technology. The following enhancements would be very useful to the format:

Signing with X.509 or GPG keys data segments and metadata.

Encryption of data segments with an AES-256 key specified by a password

Encryption of the AES-256 key with a public key (and decryption with a corresponding private key)

Evaluation of the AFF data page size. What is the optimal page size for compressed forensic work?

Replacement of the AFF "BADFLAG" approach for indicating bad data with a bitmap.

Flash Memory

Flash memory devices such as USB keys implement a wear leveling algorithm in hardware so that frequently rewritten blocks are actually written to many different physical blocks. Are there any devices that let you access the raw flash cells underneath the wear leveling chip? Can you get statistics out of the device? Can you access pages that have been mapped out (and still have valid data) but haven't been mapped back yet? Can you use this as a technique for accessing deleted information?